Exam 6: Risk Management: Identifying and Assessing Risk
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
The secretarial community often takes on the leadership role in addressing risk.____________
(True/False)
4.9/5
(47)
What should the prioritized list of assets and their vulnerabilities and the prioritized list of threats facing the organization be combined to create?
(Multiple Choice)
4.8/5
(28)
Having an established risk management program means that an organization's assets are completely protected.
(True/False)
4.7/5
(37)
Which of the following is an example of a technological obsolescence threat?
(Multiple Choice)
4.9/5
(27)
Assigns a risk-rating ranked value to each uncontrolled asset-vulnerability pair.
(Multiple Choice)
4.9/5
(39)
List the stages in the risk identification process in order of occurrence.
(Essay)
4.9/5
(38)
A formal access control methodology used to assign a level ofconfidentiality to an information asset and thus restrict the number of people who can access it is known as a data categorization scheme.____________
(True/False)
4.8/5
(37)
Classification categories must be mutually exclusive and which of the following?
(Multiple Choice)
4.8/5
(35)
An evaluation of the threats to information assets,including adetermination of their potential to endanger the organization is known as exploit assessment.____________
(True/False)
4.7/5
(38)
What is defined as specific avenues that threat agents can exploit to attack an information asset?
(Multiple Choice)
4.8/5
(37)
Which of the following is a network device attribute that may be used in conjunction with DHCP,making asset-identification using this attribute difficult?
(Multiple Choice)
5.0/5
(35)
The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability are each examples of _____.
(Multiple Choice)
4.9/5
(39)
What should you be armed with to adequately assess potential weaknesses in each information asset?
(Multiple Choice)
4.9/5
(30)
An approach to combining risk identification,risk assessment,and risk appetiteinto a single strategy.is known as risk protection.___________
(True/False)
4.9/5
(46)
Some threats can manifest in multiple ways,yielding multiple exploits for an asset-threat pair. ____________
(True/False)
4.9/5
(37)
As each information asset is identified,categorized,and classified,a ________ value must also be assigned to it.
(Short Answer)
4.8/5
(33)
The recognition,enumeration,and documentation of risks to anorganization's information assets.
(Multiple Choice)
4.7/5
(41)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)